[ACA]
ACA and You, "Handbook For Members of the American Cryptogram Association", ACA publications, 1995.
[ACA1]
Anonymous, "The ACA and You - Handbook For Secure Communications", American Cryptogram Association, 1994.
[ACM]
Association For Computing Machinery, "Codes, Keys and Conflicts: Issues in U.S. Crypto Policy." Report of a Special Panel of ACM U. S. Public Policy Committee (USACM), June 1994.
[AFM]
"AFM - 100-80, Traffic Analysis", Department of the Air Force, 1946.
[ALAN]
Turing, Alan, "The Enigma", by A. Hodges. Simon and Schuster, 1983.
[ALBA]
Alberti, "Treatise De Cifris", Meister Papstlichen, Princeton University Press, Princeton, N.J., 1963.
[ALKA]
al-Kadi, Ibrahim A., "Origins of Cryptology: The Arab Contributions, Cryptologia", Vol XVI, No. 2, April 1992, pp 97-127.
[AND1]
Andree, Josephine, "Chips from the Math Log", Mu Alpha Theta, 1966.
[AND2]
Andree, Josephine, "More Chips from the Math Log", Mu Alpha Theta, 1970.
[AND3]
Andree, Josephine, "Lines from the O.U. Mathematics Letter", Vols I,II,III, Mu Alpha Theta, 1971,1971,1971.
[AND4]
Andree, Josephine and Richard V., "RAJA Books: a Puzzle Potpourri", RAJA, 1976.
[ANDR]
Andrew, Christopher, "Secret Service", Heinemann, London 1985.
[ANNA]
Anonymous., "The History of the International Code.", Proceedings of the United States Naval Institute, 1934.
[ANN1]
Anonymous., "Speech and Facsimile Scrambling and Decoding", Aegean Park Press, Laguna Hills, CA, 1981.
[ANTH]
Anthony - Cave Brown, "Bodyguard of Lies", Harper and Row, New York, 1975.
[ASIR]
Anonymous, "Enigma and Other Machines", Air Scientific Institute Report, 1976.
[AUG1]
D. A. August, "Cryptography and Exploitation of Chinese Manual Cryptosystems - Part I:The Encoding Problem", Cryptologia, Vol XIII, No. 4, October 1989.
[AUG2]
D. A. August, "Cryptography and Exploitation of Chinese Manual Cryptosystems - Part II:The Encrypting Problem", Cryptologia, Vol XIV, No. 1, August 1990.
[BADE]
Badeau, J. S. et. al.,"The Genius of Arab Civilization: Source of Renaissance". Second Edition. Cambridge: MIT Press. 1983.
[BAMF]
Bamford, James,"The Puzzle Palace: A Report on America's Most Secret Agency", Boston, Houghton Mifflin, 1982.
[BARB]
Barber, F. J. W., "Archaeological Decipherment: A Handbook", Princeton University Press, 1974.
[B201]
Barker, Wayne G., "Cryptanalysis of The Simple Substitution Cipher with Word Divisions," Course #201, Aegean Park Press, Laguna Hills, CA. 1982.
[BALL]
Ball, W. W. R., "Mathematical Recreations and Essays", London, 1928.
[BAR1]
Barker, Wayne G., "Course No 201, Cryptanalysis of The Simple Substitution Cipher with Word Divisions," Aegean Park Press, Laguna Hills, CA. 1975.
[BAR2]
Barker, W., ed., "History of Codes and Ciphers in the U.S. During the Period between World Wars, Part II", 1930 - 1939., Aegean Park Press, 1990.
[BAR3]
Barker, Wayne G., "Cryptanalysis of the Hagelin Cryptograph", Aegean Park Press, 1977.
[BAR4]
Barker, Wayne G., "Cryptanalysis of the Enciphered Code Problem - Where Additive method of Encipherment Has Been Used", Aegean Park Press, 1979.
[BARK]
Barker, Wayne G., "Cryptanalysis of The Simple Substitution Cipher with Word Divisions", Aegean Park Press, Laguna Hills, CA. 1973.
[BARR]
Barron, John, "KGB: The Secret Work Of Soviet Agents", Bantom Books, New York, 1981.
[BAUD]
Baudouin, Captain Roger, "Elements de Cryptographie", Paris, 1939.
[BAZE]
Bazeries, M. le Capitaine, "Cryptograph a 20 rondelles- alphabets, Compte rendu de la 20e session de l' Association Francaise pour l'Advancement des Scienses", Paris: Au secretariat de l' Association, 1892.
[BEES]
Beesley, P., "Very Special Intelligence", Doubleday, New York, 1977.
[BLK]
Blackstock, Paul W. and Frank L Schaf, Jr., "Intelligence, Espionage, Counterespionage and Covert Operations", Gale Research Co., Detroit, MI., 1978.
[BLOC]
Bloch, Gilbert and Ralph Erskine, "Exploit the Double Encipherment Flaw in Enigma", Cryptologia, vol 10, #3, July 1986, p134 ff. (29)
[BLUE]
Bearden, Bill, "The Bluejacket's Manual", 20th ed., Annapolis: U.S. Naval Institute, 1978.
[BODY]
Brown, Anthony - Cave, "Bodyguard of Lies", Harper and Row, New York, 1975.
[BOLI]
Bolinger, D. and Sears, D., "Aspects of Language", 3rd ed., Harcourt Brace Jovanovich,Inc., New York, 1981.
[BOSW]
Bosworth, Bruce, Codes, "Ciphers and Computers: An Introduction to Information Security", Hayden Books, Rochelle Park, NJ, 1990.
[BOWE]
Bowers, William Maxwell, "The Bifid Cipher", Practical Cryptanalysis, II, ACA, 1960.
[BOWN]
Bowen, Russell J., "Scholar's Guide to Intelligence Literature: Bibliography of the Russell J. Bowen Collection", National Intelligence Study Center, Frederick, MD, 1983.
[BP82]
Beker, H., and Piper, F., "Cipher Systems, The Protection of Communications", John Wiley and Sons, NY, 1982.
[BRAS]
Brasspounder, Language Data - German, MA89, "The Cryptogram", American Cryptogram Association, 1989.
[BREN]
Brennecke, J., "Die Wennde im U-Boote-Krieg:Ursachen und Folgren 1939 - 1943", Herford, Koehler, 1984.
[BROO]
Brook, Maxey, "150 Puzzles in Cryptarithmetic", Dover, 1963.
[BRIT]
Anonymous, "British Army Manual of Cryptography", HMF, 1914.
[BROG]
Broglie, Duc de, "Le Secret du roi: Correspondance secrete de Louis XV avec ses agents diplomatiques 1752-1774", 3rd ed. Paris, Calmann Levy, 1879.
[BRYA]
Bryan, William G., "Practical Cryptanalysis - Periodic Ciphers -Miscellaneous", Vol 5, American Cryptogram Association, 1967.
[BURL]
Burling, R., "Man's Many Voices: Language in Its Cultural Context", Holt, Rinehart & Winston, New York, 1970.
[CAND]
Candela, Rosario, "Isomorphism and its Application in Cryptanalytics", Cardanus Press, NYC 1946.
[CAR1]
Carlisle, Sheila. "Pattern Words: Three to Eight Letters in Length", Aegean Park Press, Laguna Hills, CA 92654, 1986.
[CAR2]
Carlisle, Sheila. "Pattern Words: Nine Letters in Length", Aegean Park Press, Laguna Hills, CA 92654, 1986.
[CASE]
Casey, William, "The Secret War Against Hitler", Simon & Schuster, London 1989.
[CAVE]
Cave Brown, Anthony, "Bodyguard of Lies", Harper & Row, New York 1975.
[CCF]
Foster, C. C., "Cryptanalysis for Microcomputers", Hayden Books, Rochelle Park, NJ, 1990.
[CHOI]
"Interview with Grand Master Sin Il Choi.",9th DAN, June 25, 1995.
[CHOM]
Chomsky, Norm, "Syntactic Structures", The Hague: Mouton, 1957.
[CHUN]
Chungkuo Ti-erh Lishih Tangankuan, ed, "K'ang-Jih chengmien chanch'ang", Chiangsu Kuchi Ch'upansheh, 1987., pp993-1026.
[CI]
"FM 34-60, Counterintelligence", Department of the Army, February 1990.
[COUR]
Courville, Joseph B., "Manual For Cryptanalysis Of The Columnar Double Transposition Cipher", by Courville Assoc., South Gate, CA, 1986.
[CLAR]
Clark, Ronald W., T"he Man who broke Purple", Weidenfeld and Nicolson, London 1977.
[COLF]
Collins Gem Dictionary, "French", Collins Clear Type Press, 1979.
[COLG]
Collins Gem Dictionary, "German", Collins Clear Type Press, 1984.
[COLI]
Collins Gem Dictionary, "Italian", Collins Clear Type Press, 1954.
[COLL]
Collins Gem Dictionary, "Latin", Collins Clear Type Press, 1980.
[COLP]
Collins Gem Dictionary, "Portuguese", Collins Clear Type Press, 1981.
[COLR]
Collins Gem Dictionary, "Russian", Collins Clear Type Press, 1958.
[COLS]
Collins Gem Dictionary, "Spanish", Collins Clear Type Press, 1980.
[COPP]
Coppersmith, Don., "IBM Journal of Research and Development 38", 1994.
[COVT]
Anonymous, "Covert Intelligence Techniques Of the Soviet Union, Aegean Park Press, Laguna Hills, Ca. 1980.
[CREM]
Cremer, Peter E.," U-Boat Commander: A Periscope View of The Battle of The Atlantic," New York, Berkley, 1986.
[CULL]
Cullen, Charles G., "Matrices and Linear Transformations," 2nd Ed., Dover Advanced Mathematics Books, NY, 1972.
[DAGA]
D'agapeyeff, Alexander, "Codes and Ciphers," Oxford University Press, London, 1974.
[DALT]
Dalton, Leroy, "Topics for Math Clubs," National Council of Teachers and Mu Alpha Theta, 1973.
[DAN]
Daniel, Robert E., "Elementary Cryptanalysis: Cryptography For Fun," Cryptiquotes, Seattle, WA., 1979.
[DAVI]
Da Vinci, "Solving Russian Cryptograms", The Cryptogram, September-October, Vol XLII, No 5. 1976.
[DEAC]
Deacon, R., "The Chinese Secret Service," Taplinger, New York, 1974.
[DEAU]
Bacon, Sir Francis, "De Augmentis Scientiarum," tr. by Gilbert Watts, (1640) or tr. by Ellis, Spedding, and Heath (1857,1870).
[DELA]
Delastelle, F., Cryptographie nouvelle, Maire of Saint- Malo, P. Dubreuil, Paris, 1893.
[DENN]
Denning, Dorothy E. R.," Cryptography and Data Security," Reading: Addison Wesley, 1983.
[DEVO]
Deavours, Cipher A. and Louis Kruh, Machine Cryptography and Modern Cryptanalysis, Artech, New York, 1985.
[DEV1]
Deavours, C. A., "Breakthrough '32: The Polish Solution of the ENIGMA," Aegean Park Press, Laguna Hills, CA, 1988.
[DEV2]
Deavours, C. A. and Reeds, J.,"The ENIGMA," CRYPTOLOGIA, Vol I No 4, Oct. 1977.
[DEV3]
Deavours, C. A.,"Analysis of the Herbern cryptograph using Isomorphs," CRYPTOLOGIA, Vol I No 2, April, 1977.
[DIFF]
Diffie, Whitfield," The First Ten Years of Public Key Cryptography," Proceedings of the IEEE 76 (1988): 560- 76.
[DIFE]
Diffie, Whitfield and M.E. Hellman,"New Directions in Cryptography, IEEE Transactions on Information Theory IT-22, 1976.
[DONI]
Donitz, Karl, Memoirs: Ten Years and Twenety Days, London: Weidenfeld and Nicolson, 1959.
[DOW]
Dow, Don. L., "Crypto-Mania, Version 3.0", Box 1111, Nashua, NH. 03061-1111, (603) 880-6472, Cost $15 for registered version and available as shareware under CRYPTM.zip on CIS or zipnet.
[EIIC]
Ei'ichi Hirose, ",Finland ni okeru tsushin joho," in Showa gunji hiwa: Dodai kurabu koenshu, Vol 1, Dodai kurabu koenshu henshu iinkai, ed., (Toyko: Dodai keizai konwakai, 1987), pp 59-60.
[ELCY]
Gaines, Helen Fouche, Cryptanalysis, Dover, New York, 1956.
[ENIG]
Tyner, Clarence E. Jr., and Randall K. Nichols, "ENIGMA95 - A Simulation of Enhanced Enigma Cipher Machine on A Standard Personal Computer," for publication, November, 1995.
[EPST]
Epstein, Sam and Beryl, "The First Book of Codes and Ciphers," Ambassador Books, Toronto, Canada, 1956.
[ERSK]
Erskine, Ralph, "Naval Enigma: The Breaking of Heimisch and Triton," Intelligence and National Security 3, Jan. 1988.
[EVES]
Eves, Howard, "An Introduction to the History of Mathematics, " New York, Holt Rinehart winston, 1964.
[EYRA]
Eyraud, Charles, "Precis de Cryptographie Moderne'" Paris, 1953.
[FL]
Anonymous, The Friedman Legacy: A Tribute to William and Elizabeth Friedman, National Security Agency, Central Security Service, Center for Cryptological History,1995.
[FLIC]
Flicke, W. F., "War Secrets in the Ether," Aegean Park Press, Laguna Hills, CA, 1994.
[FOWL]
Fowler, Mark and Radhi Parekh, " Codes and Ciphers, - Advanced Level," EDC Publishing, Tulsa OK, 1994. (clever and work)
[FREB]
Friedman, William F., "Cryptology," The Encyclopedia Britannica, all editions since 1929. A classic article by the greatest cryptanalyst.
[FR1]
Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part I - Volume 1, Aegean Park Press, Laguna Hills, CA, 1985.
[FR2]
Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part I - Volume 2, Aegean Park Press, Laguna Hills, CA, 1985.
[FR3]
Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part III, Aegean Park Press, Laguna Hills, CA, 1995.
[FR4]
Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part IV, Aegean Park Press, Laguna Hills, CA, 1995.
[FR5]
Friedman, William F. Military Cryptanalysis - Part I, Aegean Park Press, Laguna Hills, CA, 1980.
[FR6]
Friedman, William F. Military Cryptanalysis - Part II, Aegean Park Press, Laguna Hills, CA, 1980.
[FRE]
Friedman, William F. , "Elements of Cryptanalysis," Aegean Park Press, Laguna Hills, CA, 1976.
[FREA]
Friedman, William F. , "Advanced Military Cryptography," Aegean Park Press, Laguna Hills, CA, 1976.
[FRAA]
Friedman, William F. , "American Army Field Codes in The American Expeditionary Forces During the First World War, USA 1939.
[FRAB]
Friedman, W. F., Field Codes used by the German Army During World War. 1919.
[FR22]
Friedman, William F., The Index of Coincidence and Its Applications In Cryptography, Publication 22, The Riverbank Publications, Aegean Park Press, Laguna Hills, CA, 1979.
[FR6]
Friedman, W. F., "Six Lectures On Cryptology," National Archives, SRH-004.
[FROM]
Fromkin, V and Rodman, R., "Introduction to Language," 4th ed.,Holt Reinhart & Winston, New York, 1988.
[FRS]
Friedman, William F. and Elizabeth S., "The Shakespearean Ciphers Examined," Cambridge University Press, London, 1957.
[FUMI]
Fumio Nakamura, Rikugun ni okeru COMINT no hoga to hatten," The Journal of National Defense, 16-1 (June 1988) pp85 - 87.
[GAJ]
Gaj, Krzysztof, "Szyfr Enigmy: Metody zlamania," Warsaw Wydawnictwa Komunikacji i Lacznosci, 1989.
[GAR1]
Gardner, Martin, "536 Puzzles and Curious Problems," Scribners, 1967.
[GAR2]
Gardner, Martin, "Mathematics, Magic, and Mystery ," Dover, 1956.
[GAR3]
Gardner, Martin, "New Mathematical Diversions from Scientific American," Simon and Schuster, 1966.
[GAR4]
Gardner, Martin, "Sixth Book of Mathematical Games from Scientific American," Simon and Schuster, 1971.
[GARL]
Garlinski, Jozef, 'The Swiss Corridor', Dent, London 1981.
[GAR1]
Garlinski, Jozef, 'Hitler's Last Weapons', Methuen, London 1978.
[GAR2]
Garlinski, Jozef, 'The Enigma War', New York, Scribner, 1979.
[GERM]
"German Dictionary," Hippocrene Books, Inc., New York, 1983.
[GIVI]
Givierge, General Marcel, " Course In Cryptography," Aegean Park Press, Laguna Hills, CA, 1978. Also, M. Givierge, "Cours de Cryptographie," Berger-Levrault, Paris, 1925.
[GLEA]
Gleason, A. M., "Elementary Course in Probability for the Cryptanalyst," Aegean Park Press, Laguna Hills, CA, 1985.
[GODD]
Goddard, Eldridge and Thelma, "Cryptodyct," Marion, Iowa, 1976
[GORD]
Gordon, Cyrus H., " Forgotten Scripts: Their Ongoing Discovery and Decipherment," Basic Books, New York, 1982.
[GRA1]
Grandpre: "Grandpre, A. de--Cryptologist. Part 1 'Cryptographie Pratique - The Origin of the Grandpre', ISHCABIBEL, The Cryptogram, SO60, American Cryptogram Association, 1960.
[GRA2]
Grandpre: "Grandpre Ciphers", ROGUE, The Cryptogram, SO63, American Cryptogram Association, 1963.
[GRA3]
Grandpre: "Grandpre", Novice Notes, LEDGE, The Cryptogram, MJ75, American Cryptogram Association,1975
[GRAH]
Graham, L. A., "Ingenious Mathematical Problems and Methods," Dover, 1959.
[GREU]
Greulich, Helmut, "Spion in der Streichholzschachtel: Raffinierte Methoden der Abhortechnik, Gutersloh: Bertelsmann, 1969.
[GUST]
Gustave, B., "Enigma:ou, la plus grande 'enigme de la guerre 1939-1945." Paris:Plon, 1973.
[HA]
Hahn, Karl, " Frequency of Letters", English Letter Usage Statistics using as a sample, "A Tale of Two Cities" by Charles Dickens, Usenet SCI.Crypt, 4 Aug 1994.
[HAWA]
Hitchcock, H. R., "Hawaiian," Charles E. Tuttle, Co., Toyko, 1968.
[HAWC]
Hawcock, David and MacAllister, Patrick, "Puzzle Power! Multidimensional Codes, Illusions, Numbers, and Brainteasers," Little, Brown and Co., New York, 1994.
[HELD]
Held, Gilbert, "Top Secret Data Encryption Techniques," Prentice Hall, 1993. (great title..limited use)
[HEMP]
Hempfner, Philip and Tania, "Pattern Word List For Divided and Undivided Cryptograms," unpublished manuscript, 1984.
[HEPP]
Hepp, Leo, "Die Chiffriermaschine 'ENIGMA'", F-Flagge, 1978.
[HIDE]
Hideo Kubota, " Zai-shi dai-go kokugun tokushu joho senshi." unpublished manuscript, NIDS.
[HILL]
Hill, Lester, S., "Cryptography in an Algebraic Alphabet", The American Mathematical Monthly, June-July 1929.
[HIL1]
Hill, L. S. 1929. Cryptography in an Algebraic Alphabet. American Mathematical Monthly. 36:306-312.
[HIL2]
Hill, L. S. 1931. Concerning the Linear Transformation Apparatus in Cryptography. American Mathematical Monthly. 38:135-154.
[HINS]
Hinsley, F. H., "History of British Intelligence in the Second World War", Cambridge University Press, Cambridge, 1979-1988.
[HIN2]
Hinsley, F. H. and Alan Strip in "Codebreakers -Story of Bletchley Park", Oxford University Press, 1994.
[HIN3]
Hinsley, F. H., et. al., "British Intilligence in The Second World War: Its Influence on Strategy and Operations," London, HMSO vol I, 1979, vol II 1981, vol III, 1984 and 1988.
[HISA]
Hisashi Takahashi, "Military Friction, Diplomatic Suasion in China, 1937 - 1938," The Journal of International Studies, Sophia Univ, Vol 19, July, 1987.
[HIS1]
Barker, Wayne G., "History of Codes and Ciphers in the U.S. Prior to World War I," Aegean Park Press, Laguna Hills, CA, 1978.
[HITT]
Hitt, Parker, Col. " Manual for the Solution of Military Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[HODG]
Hodges, Andrew, "Alan Turing: The Enigma," New York, Simon and Schuster, 1983.
[HOFF]
Hoffman, Lance J., editor, "Building In Big Brother: The Cryptographic Policy Debate," Springer-Verlag, N.Y.C., 1995. ( A useful and well balanced book of cryptographic resource materials. )
[HOF1]
Hoffman, Lance. J., et. al.," Cryptography Policy," Communications of the ACM 37, 1994, pp. 109-17.
[HOLM]
Holmes, W. J., "Double-Edged Secrets: U.S. Naval Intelligence Operations in the Pacific During WWII", Annapolis, MD: Naval Institute Press, 1979.
[HOM1]
Homophonic: A Multiple Substitution Number Cipher", S- TUCK, The Cryptogram, DJ45, American Cryptogram Association, 1945.
[HOM2]
Homophonic: Bilinear Substitution Cipher, Straddling," ISHCABIBEL, The Cryptogram, AS48, American Cryptogram Association, 1948.
[HOM3]
Homophonic: Computer Column:"Homophonic Solving," PHOENIX, The Cryptogram, MA84, American Cryptogram Association, 1984.
[HOM4]
Homophonic: Hocheck Cipher,", SI SI, The Cryptogram, JA90, American Cryptogram Association, 1990.
[HOM5]
Homophonic: "Homophonic Checkerboard," GEMINATOR, The Cryptogram, MA90, American Cryptogram Association, 1990.
[HOM6]
Homophonic: "Homophonic Number Cipher," (Novice Notes) LEDGE, The Cryptogram, SO71, American Cryptogram Association, 1971.
[HUNG]
Rip Van Winkel, "Hungarian," The Cryptogram, March - April, American Cryptogram Association, 1956.
[HYDE]
H. Montgomery Hyde, "Room 3603, The Story of British Intelligence Center in New York During World War II", New York, Farrar, Straus, 1963.
[IBM1]
IBM Research Reports, Vol 7., No 4, IBM Research, Yorktown Heights, N.Y., 1971.
[INDE]
PHOENIX, Index to the Cryptogram: 1932-1993, ACA, 1994.
[ITAL]
Italian - English Dictionary, compiled by Vittore E. Bocchetta, Fawcett Premier, New York, 1965.
[JAPA]
Martin, S.E., "Basic Japanese Coversation Dictionary," Charles E. Tuttle Co., Toyko, 1981.
[JOHN]
Johnson, Brian, 'The Secret War', Arrow Books, London 1979.
[KADI]
al-Kadi, Ibrahim A., Cryptography and Data Security: Cryptographic Properties of Arabic, Proceedings of the Third Saudi Engineering Conference. Riyadh, Saudi Arabia: Nov 24-27, Vol 2:910-921., 1991.
[KAHN]
Kahn, David, "The Codebreakers", Macmillian Publishing Co. , 1967.
[KAH1]
Kahn, David, "Kahn On Codes - Secrets of the New Cryptology," MacMillan Co., New York, 1983.
[KAH2]
Kahn, David, "An Enigma Chronology", Cryptologia Vol XVII,Number 3, July 1993.
[KAH3]
Kahn, David, "Seizing The Enigma: The Race to Break the German U-Boat Codes 1939-1943 ", Houghton Mifflin, New York, 1991.
[KERC]
Kerckhoffs, "la Cryptographie Militaire, " Journel des Sciences militaires, 9th series, IX, (January and February, 1883, Libraire Militaire de L. Baudoin., Paris. English trans. by Warren T, McCready of the University of Toronto, 1964
[KOBL]
Koblitz, Neal, " A Course in Number Theory and Cryptography, 2nd Ed, Springer-Verlag, New York, 1994.
[KONH]
Konheim, Alan G., "Cryptography -A Primer" , John Wiley, 1981, pp 212 ff.
[KORD]
Kordemsky, B., "The Moscow Puzzles," Schribners, 1972.
[KOTT]
Kottack, Phillip Conrad, "Anthropology: The Exploration Of Human Diversity," 6th ed., McGraw-Hill, Inc., New York, N.Y. 1994.
[KOZA]
Kozaczuk, Dr. Wladyslaw, "Enigma: How the German Machine Cipher was Broken and How it Was Read by the Allies in WWI", University Pub, 1984.
[KRAI]
Kraitchek, "Mathematical Recreations," Norton, 1942, and Dover, 1963.
[KULL]
Kullback, Solomon, Statistical Methods in Cryptanalysis, Aegean Park Press, Laguna Hills, Ca. 1976
[LAFF]
Laffin, John, "Codes and Ciphers: Secret Writing Through The Ages," Abelard-Schuman, London, 1973.
[LAI]
Lai, Xuejia, "On the Design and Security of Block Ciphers," ETH Series in Information Processing 1, 1992. (Article defines the IDEA Cipher)
[LAIM]
Lai, Xuejia, and James L. Massey, "A Proposal for a New Block Encryption Standard," Advances in Cryptology - Eurocrypt 90 Proceedings, 1992, pp. 55-70.
[LAKE]
Lakoff, R., "Language and the Women's Place," Harper & Row, New York, 1975.
[LANG]
Langie, Andre, "Cryptography," translated from French by J.C.H. Macbeth, Constable and Co., London, 1922.
[LATI]
BRASSPOUNDER, "Latin Language Data, "The Cryptogram," July-August 1993.
[LAUE]
Lauer, Rudolph F., "Computer Simulation of Classical Substitution Cryptographic Systems" Aegean Park Press, 1981, p72 ff.
[LEAR]
Leary, Penn, " The Second Cryptographic Shakespeare," Omaha, NE [from author] 1994.
[LEA1]
Leary, Penn, " Supplement to The Second Cryptographic Shakespeare," Omaha, NE [from author] 1994.
[LEAU]
Leaute, H., "Sur les Mecanismes Cryptographiques de M. de Viaris," Le Genie Civil, XIII, Sept 1, 1888.
[LEDG]
LEDGE, "NOVICE NOTES," American Cryptogram Association, 1994. [ One of the best introductory texts on ciphers written by an expert in the field. Not only well written, clear to understand but as authoritative as they come! ]
[LENS]
Lenstra, A.K. et. al. "The Number Field Sieve," Proceedings of the 22 ACM Symposium on the Theory of Computing," Baltimore, ACM Press, 1990, pp 564-72.
[LEN1]
Lenstra, A.K. et. al. "The Factorization of the Ninth Fermat Number," Mathematics of Computation 61 1993, pp. 319-50.
[LEWI]
Lewin, Ronald, 'Ultra goes to War', Hutchinson, London 1978.
[LEWY]
Lewy, Guenter, "America In Vietnam", Oxford University Press, New York, 1978.
[LEVI]
Levine, J., U.S. Cryptographic Patents 1861-1981, Cryptologia, Terre Haute, In 1983.
[LEV1]
Levine, J. 1961. Some Elementary Cryptanalysis of Algebraic Cryptography. American Mathematical Monthly. 68:411-418
[LEV2]
Levine, J. 1961. Some Applications of High- Speed Computers to the Case n =2 of Algebraic Cryptography. Mathematics of Computation. 15:254-260
[LEV3]
Levine, J. 1963. Analysis of the Case n =3 in Algebraic Cryptography With Involuntary Key Matrix With Known Alphabet. Journal fuer die Reine und Angewante Mathematik. 213:1-30.
[LISI]
Lisicki, Tadeusz, 'Dzialania Enigmy', Orzet Biaty, London July-August, 1975; 'Enigma i Lacida', Przeglad lacznosci, London 1974- 4; 'Pogromcy Enigmy we Francji', Orzet Biaty, London, Sept. 1975.'
[LYNC]
Lynch, Frederick D., "Pattern Word List, Vol 1.," Aegean Park Press, Laguna Hills, CA, 1977.
[LYSI]
Lysing, Henry, aka John Leonard Nanovic, "Secret Writing," David Kemp Co., NY 1936.
[MACI]
Macintyre, D., "The Battle of the Atlantic," New York, Macmillan, 1961.
[MADA]
Madachy, J. S., "Mathematics on Vacation," Scribners, 1972.
[MAGN]
Magne, Emile, Le plaisant Abbe de Boisrobert, Paris, Mecure de France, 1909.
[MANN]
Mann, B.,"Cryptography with Matrices," The Pentagon, Vol 21, Fall 1961.
[MANS]
Mansfield, Louis C. S., "The Solution of Codes and Ciphers", Alexander Maclehose & Co., London, 1936.
[MARO]
Marotta, Michael, E. "The Code Book - All About Unbreakable Codes and How To Use Them," Loompanics Unlimited, 1979. [This is a terrible book. Badly written, without proper authority, unprofessional, and prejudicial to boot. And, it has one of the better illustrations of the Soviet one-time pad with example.]
[MARS]
Marshall, Alan, "Intelligence and Espionage in the Reign of Charles II," 1660-1665, Cambridge University, New York, N.Y., 1994.
[MART]
Martin, James, "Security, Accuracy and Privacy in Computer Systems," Prentice Hall, Englewood Cliffs, N.J., 1973.
[MAVE]
Mavenel, Denis L., Lettres, Instructions Diplomatiques et Papiers d' Etat du Cardinal Richelieu, Historie Politique, Paris 1853-1877 Collection.
[MAYA]
Coe, M. D., "Breaking The Maya Code," Thames and Hudson, New York, 1992.
[MAZU]
Mazur, Barry, "Questions On Decidability and Undecidability in Number Theory," Journal of Symbolic Logic, Volume 54, Number 9, June, 1994.
[MELL]
Mellen G. 1981. Graphic Solution of a Linear Transformation Cipher. Cryptologia. 5:1-19.
[MEND]
Mendelsohn, Capt. C. J., Studies in German Diplomatic Codes Employed During World War, GPO, 1937.
[MERK]
Merkle, Ralph, "Secrecy, Authentication and Public Key Systems," Ann Arbor, UMI Research Press, 1982.
[MER1]
Merkle, Ralph, "Secure Communications Over Insecure Channels," Communications of the ACM 21, 1978, pp. 294- 99.
[MER2]
Merkle, Ralph and Martin E. Hellman, "On the Security of Multiple Encryption ," Communications of the ACM 24, 1981, pp. 465-67.
[MER3]
Merkle, Ralph and Martin E. Hellman, "Hiding Information and Signatures in Trap Door Knapsacks," IEEE Transactions on Information Theory 24, 1978, pp. 525-30.
[MILL]
Millikin, Donald, " Elementary Cryptography ", NYU Bookstore, NY, 1943.
[MM]
Meyer, C. H., and Matyas, S. M., " CRYPTOGRAPHY - A New Dimension in Computer Data Security, " Wiley Interscience, New York, 1982.
[MODE]
Modelski, Tadeusz, 'The Polish Contribution to the Ultimate Allied Victory in the Second World War', Worthing (Sussex) 1986.
[MRAY]
Mrayati, Mohammad, Yahya Meer Alam and Hassan al- Tayyan., Ilm at-Ta'miyah wa Istikhraj al-Mu,amma Ind al-Arab. Vol 1. Damascus: The Arab Academy of Damascus., 1987.
[MULL]
Mulligan, Timothy," The German Navy Examines its Cryptographic Security, Oct. 1941, Military affairs, vol 49, no 2, April 1985.
[MYER]
Myer, Albert, "Manual of Signals," Washington, D.C., USGPO, 1879.
[NBS]
National Bureau of Standards, "Data Encryption Standard," FIPS PUB 46-1, 1987.
[NIBL]
Niblack, A. P., "Proposed Day, Night and Fog Signals for the Navy with Brief Description of the Ardois Hight System," In Proceedings of the United States Naval Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC1]
Nichols, Randall K., "Xeno Data on 10 Different Languages," ACA-L, August 18, 1995.
[NIC2]
Nichols, Randall K., "Chinese Cryptography Parts 1-3," ACA-L, August 24, 1995.
[NIC3]
Nichols, Randall K., "German Reduction Ciphers Parts 1-4," ACA-L, September 15, 1995.
[NIC4]
Nichols, Randall K., "Russian Cryptography Parts 1-3," ACA-L, September 05, 1995.
[NIC5]
Nichols, Randall K., "A Tribute to William F. Friedman", NCSA FORUM, August 20, 1995.
[NIC6]
Nichols, Randall K., "Wallis and Rossignol," NCSA FORUM, September 25, 1995.
[NIC7]
Nichols, Randall K., "Arabic Contributions to Cryptography,", in The Cryptogram, ND95, ACA, 1995.
[NIC8]
Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse Code System," The Cryptogram, SO95, ACA publications, 1995.
[NIC9]
Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10, 1995.
[NICX]
Nichols, R. K., Keynote Speech to A.C.A. Convention, "Breaking Ciphers in Other Languages.," New Orleans, La., 1993.
[NICK]
Nickels, Hamilton, "Codemaster: Secrets of Making and Breaking Codes," Paladin Press, Boulder, CO., 1990.
[NORM]
Norman, Bruce, 'Secret Warfare', David & Charles, Newton Abbot (Devon) 1973.
[NORW]
Marm, Ingvald and Sommerfelt, Alf, "Norwegian," Teach Yourself Books, Hodder and Stoughton, London, 1967.
[NSA]
NSA's Friedman Legacy - A Tribute to William and Elizabeth Friedman, NSA Center for Cryptological History, 1992, pp 201 ff.
[OKLA]
Andre, Josephine and Richard V. Andree, "Cryptarithms," Unit One, Problem Solving and Logical Thinking, University of Oklahoma, Norman, Ok. Copy No: 486, 1976.
[OKLI]
Andre, Josephine and Richard V. Andree, " Instructors Manual For Cryptarithms," Unit One, Problem Solving and Logical Thinking, University of Oklahoma, Norman, Ok. Copy No: 486, 1976.
[OP20]
"Course in Cryptanalysis," OP-20-G', Navy Department, Office of Chief of Naval Operations, Washington, 1941.
[PERR]
Perrault, Charles, Tallement des Reaux, Les Historiettes, Bibliotheque del La Pleiade, Paris 1960, pp 256-258.
[PGP]
Garfinkel, Simson, "PGP: Pretty Good Privacy," O'reilly and Associates, Inc. Sebastopol, CA. 1995.
[PHIL]
Phillips, H., "My Best Puzzles in Logic and Reasoning," Dover, 1961.
[PIER]
Pierce, Clayton C., "Cryptoprivacy", 325 Carol Drive, Ventura, Ca. 93003.
[POLY]
Polya, G., "Mathematics and Plausible Reasoning," Princeton Press, 1954.
[POL1]
Polya, G., "How To Solve It.," Princeton Press, 1948.
[POPE]
Pope, Maurice, "The Story of Decipherment: From Egyptian Hieroglyphic to Linear B., Thames and Hudson Ltd., 1975.
[PORT]
Barker, Wayne G. "Cryptograms in Portuguese," Aegean Park Press, Laguna Hills, CA., 1986.
[POR1]
Aliandro, Hygino, "The Portuguese-English Dictionary," Pocket Books, New York, N.Y., 1960.
[PRIC]
Price, A.,"Instruments of Darkness: the History of Electronic Warfare, London, Macdonalds and Janes, 1977.
[RAJ1]
"Pattern and Non Pattern Words of 2 to 6 Letters," G & C. Merriam Co., Norman, OK. 1977.
[RAJ2]
"Pattern and Non Pattern Words of 7 to 8 Letters," G & C. Merriam Co., Norman, OK. 1980.
[RAJ3]
"Pattern and Non Pattern Words of 9 to 10 Letters," G & C. Merriam Co., Norman, OK. 1981.
[RAJ4]
"Non Pattern Words of 3 to 14 Letters," RAJA Books, Norman, OK. 1982.
[RAJ5]
"Pattern and Non Pattern Words of 10 Letters," G & C. Merriam Co., Norman, OK. 1982.
[REJE]
Rejewski, Marian, "Mathematical Solution of the Enigma Cipher" published in vol 6, #1, Jan 1982 Cryptologia pp 1-37.
[RENA]
Renauld, P. "La Machine a' chiffrer 'Enigma'", Bulletin Trimestriel de l'association des Amis de L'Ecole superieure de guerre no 78, 1978.
[RHEE]
Rhee, Man Young, "Cryptography and Secure Commun- ications," McGraw Hill Co, 1994
[RIVE]
Rivest, Ron, "Ciphertext: The RSA Newsletter 1, 1993.
[RIV1]
Rivest, Ron, Shamir, A and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communications of the ACM 21, 1978.
[ROAC]
Roach, T., "Hobbyist's Guide To COMINT Collection and Analysis," 1330 Copper Peak Lane, San Jose, Ca. 95120- 4271, 1994.
[ROBO]
NYPHO, The Cryptogram, Dec 1940, Feb, 1941.
[ROHE]
Jurgen Rohwer's Comparative Analysis of Allied and Axis Radio-Intelligence in the Battle of the Atlantic, Proceedings of the 13th Military History Symposium, USAF Academy, 1988, pp 77-109.
[ROHW]
Rohwer Jurgen, "Critical Convoy Battles of March 1943," London, Ian Allan, 1977.
[ROH1]
Rohwer Jurgen, "Nachwort: Die Schlacht im Atlantik in der Historischen Forschung, Munchen: Bernard and Graefe, 1980.
[ROH2]
Rohwer Jurgen, et. al. , "Chronology of the War at Sea, Vol I, 1939-1942, London, Ian Allan, 1972.
[ROH3]
Rohwer Jurgen, "U-Boote, Eine Chronik in Bildern, Oldenburs, Stalling, 1962. Skizzen der 8 Phasen.
[ROOM]
Hyde, H. Montgomery, "Room 3603, The Story of British Intelligence Center in New York During World War II", New York, Farrar, Straus, 1963.
[ROSE]
Budge, E. A. Wallis, "The Rosetta Stone," British Museum Press, London, 1927.
[RSA]
RSA Data Security, Inc., "Mailsafe: Public Key Encryption Software Users Manual, Version 5.0, Redwood City, CA, 1994
[RUNY]
Runyan, T. J. and Jan M. Copes "To Die Gallently", Westview Press 1994, p85-86 ff.
[RYSK]
Norbert Ryska and Siegfried Herda, "Kryptographische Verfahren in der Datenverarbeitung," Gesellschaft fur Informatik, Berlin, Springer-Verlag1980.
[SADL]
Sadler, A. L., "The Code of the Samurai," Rutland and Tokyo: Charles E. Tuttle Co., 1969.
[SACC]
Sacco, Generale Luigi, " Manuale di Crittografia", 3rd ed., Rome, 1947.
[SALE]
Salewski, Michael, "Die Deutscher Seekriegsleitung, 1938- 1945, Frankfurt/Main: Bernard and Graefe, 1970- 1974. 3 volumes.
[SANB]
Sanbohonbu, ed., "Sanbohonbu kotokan shokuinhyo." NIDS Archives.
[SAPR]
Sapir, E., "Conceptual Categories in Primitive Language," Science: 74: 578-584., 1931.
[SASS]
Sassoons, George, "Radio Hackers Code Book", Duckworth, London, 1986.
[SCHN]
Schneier, Bruce, "Applied Cryptography: Protocols, Algorithms, and Source Code C," John Wiley and Sons, 1994.
[SCH2]
Schneier, Bruce, "Applied Cryptography: Protocols, Algorithms, and Source Code C," 2nd ed., John Wiley and Sons, 1995.
[SCHU]
Schuh, fred, "Master Book of Mathematical Recreation," Dover, 1968.
[SCHW]
Schwab, Charles, "The Equalizer," Charles Schwab, San Francisco, 1994.
[SEBE]
Seberry, Jennifer and Joseph Pieprzyk, "Cryptography: An Introduction to Computer Security," Prentice Hall, 1989. [CAREFUL! Lots of Errors - Basic research efforts may be flawed - see Appendix A pg 307 for example.]
[SHAN]
Shannon, C. E., "The Communication Theory of Secrecy Systems," Bell System Technical Journal, Vol 28 (October 1949).
[SHIN]
Shinsaku Tamura, "Myohin kosaku," San'ei Shuppansha, Toyko, 1953.
[SIG1]
"International Code Of Signals For Visual, Sound, and Radio Communications," Defense Mapping Agency, Hydrographic/Topographic Center, United States Ed. Revised 1981
[SIG2]
"International Code Of Signals For Visual, Sound, and Radio Communications," U. S. Naval Oceanographic Office, United States Ed., Pub. 102, 1969.
[SIMM]
Simmons, G. J., "How To Insure that Data Acquired to Verify Treaty Compliance are Trustworthy, " in "Authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques.", IEEE EASCON 79, Washington, 1979, pp. 661- 62.
[SINK]
Sinkov, Abraham, "Elementary Cryptanalysis", The Mathematical Association of America, NYU, 1966.
[SISI]
Pierce, C.C., "Cryptoprivacy," Author/Publisher, Ventura Ca., 1995. (XOR Logic and SIGTOT teleprinters)
[SMIH]
Smith, David E., "John Wallis as Cryptographer", Bulletin of American Mathematical Society, XXIV, 1917.
[SMIT]
Smith, Laurence D., "Cryptography, the Science of Secret Writing," Dover, NY, 1943.
[SOLZ]
Solzhenitsyn, Aleksandr I. , "The Gulag Archipelago I- III, " Harper and Row, New York, N.Y., 1975.
[SPAN]
Barker, Wayne G. "Cryptograms in Spanish," Aegean Park Press, Laguna Hills, CA., 1986.
[STEV]
Stevenson, William, 'A Man Called INTREPID', Macmillan, London 1976.
[STIN]
Stinson, D. R., "Cryptography, Theory and Practice," CRC Press, London, 1995.
[STIX]
Stix, F., Zur Geschicte und Organisation der Wiener Geheimen Ziffernkanzlei, Mitteilungen des Osterreichischen Instituts fir Geschichtsforschung, LI 1937.
[STUR]
Sturtevant, E. H. and Bechtel, G., "A Hittite Chrestomathy," Linguistic Society of American and University of Pennsylvania, Philadelphia, 1935.
[SUVO]
Suvorov, Viktor "Inside Soviet Military Intelligence," Berkley Press, New York, 1985.
[TERR]
Terrett, D., "The Signal Corps: The Emergency (to December 1941); G. R. Thompson, et. al, The Test( December 1941 - July 1943); D. Harris and G. Thompson, The Outcome;(Mid 1943 to 1945), Department of the Army, Office of the Chief of Military History, USGPO, Washington,1956 -1966.
[THEO]
Theodore White and Annalee Jacoby, "Thunder Out Of China," William Sloane Assoc., New York, 1946.
[THOM]
Thompson, Ken, "Reflections on Trusting Trust," Communications of the ACM 27, 1984.
[TILD]
Glover, D. Beaird, Secret Ciphers of The 1876 Presidential Election, Aegean Park Press, Laguna Hills, Ca. 1991.
[TM32]
TM 32-250, Fundamentals of Traffic Analysis (Radio Telegraph) Department of the Army, 1948.
[TRAD]
U. S. Army Military History Institute, "Traditions of The Signal Corps., Washington, D.C., USGPO, 1959.
[TRAI]
Lange, Andre and Soudart, E. A., "Treatise On Cryptography," Aegean Park Press, Laguna Hills, Ca. 1981.
[TRIB]
Anonymous, New York Tribune, Extra No. 44, "The Cipher Dispatches, New York, 1879.
[TRIT]
Trithemius:Paul Chacornac, "Grandeur et Adversite de Jean Tritheme ,Paris: Editions Traditionelles, 1963.
[TUCK]
Harris, Frances A., "Solving Simple Substitution Ciphers," ACA, 1959.
[TUKK]
Tuckerman, B., "A Study of The Vigenere-Vernam Single and Multiple Loop Enciphering Systems," IBM Report RC2879, Thomas J. Watson Research Center, Yorktown Heights, N.Y. 1970.
[TUCM]
Tuckerman, B., "A Study of The Vigenere-Vernam Single and Multiple Loop Enciphering Systems," IBM Report RC2879, Thomas J. Watson Research Center, Yorktown Heights, N.Y. 1970.
[UBAL]
Ubaldino Mori Ubaldini, "I Sommergibili begli Oceani: La Marina Italian nella Seconda Guerra Mondiale," vol XII, Roma, Ufficio Storico della Marina Militare, 1963.
[USAA]
U. S. Army, Office of Chief Signal Officer, "Instructions for Using the Cipher Device Type M-94, February, 1922," USGPO, Washington, 1922.
[VAIL]
Vaille, Euggene, Le Cabinet Noir, Paris Presses Universitaires de Frances, 1950.
[VALE]
Valerio, "De La Cryptographie," Journal des Scienses militares, 9th series, Dec 1892 - May 1895, Paris.
[VAND]
Van de Rhoer, E., "Deadly Magic: A personal Account of Communications Intilligence in WWII in the Pacific, New York, Scriber, 1978.
[VERN]
Vernam, A. S., "Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications," J. of the IEEE, Vol 45, 109-115 (1926).
[VIAR]
de Viaris in Genie Civil: "Cryptographie", Publications du Journal Le Genie Civil, 1888.
[VIA1]
de Viaris, "L'art de chiffre et dechiffre les depeches secretes," Gauthier-Villars, Paris, 1893.
[VOGE]
Vogel, Donald S., "Inside a KGB Cipher," Cryptologia, Vol XIV, Number 1, January 1990.
[WALL]
Wallis, John, "A Collection of Letters and other Papers in Cipher" , Oxford University, Bodleian Library, 1653.
[WAL1]
Wallace, Robert W. Pattern Words: Ten Letters and Eleven Letters in Length, Aegean Park Press, Laguna Hills, CA 92654, 1993.
[WAL2]
Wallace, Robert W. Pattern Words: Twelve Letters and Greater in Length, Aegean Park Press, Laguna Hills, CA 92654, 1993.
[WATS]
Watson, R. W. Seton-, ed, "The Abbot Trithemius," in Tudor Studies, Longmans and Green, London, 1924.
[WEBE]
Weber, Ralph Edward, "United States Diplomatic Codes and Ciphers, 1175-1938, Chicago, Precedent Publishing, 1979.
[WEL]
Welsh, Dominic, "Codes and Cryptography," Oxford Science Publications, New York, 1993.
[WELC]
Welchman, Gordon, 'The Hut Six Story', McGraw-Hill, New York 1982.
[WHOR]
Whorf, B. L., "A Linguistic Consideration of Thinking In Primitive Communities," In Language, Thought, and Reality: Selected Writings of Benjamin Lee Whorf, ed. J. B. Carroll, Cambridge, MA: MIT Press, pp. 65-86., 1956.
[WINT]
Winton, J., " Ultra at Sea: How Breaking the Nazi Code Affected Allied Naval Strategy During WWII," New Uork, William Morror, 1988.
[WINK]
Winkle, Rip Van, "Hungarian: The Cryptogram,", March - April 1956.
[WINT]
Winterbotham, F.W., 'The Ultra Secret', Weidenfeld and Nicolson, London 1974.
[WOLE]
Wolfe, Ramond W., "Secret Writing," McGraw Hill Books, NY, 1970.
[WOLF]
Wolfe, Jack M., " A First Course in Cryptanalysis," Brooklin College Press, NY, 1943.
[WRIX]
Wrixon, Fred B. "Codes, Ciphers and Secret Languages," Crown Publishers, New York, 1990.
[XEN1]
PHOENIX, "Xenocrypt Handbook," American Cryptogram Association, 1 Pidgeon Dr., Wilbraham, MA., 01095-2603, for publication March, 1996.
[YARD]
Yardley, Herbert, O., "The American Black Chamber," Bobbs-Merrill, NY, 1931.
[YAR1]
Yardley, H. O., "The Chinese Black Chamber," Houghton Mifflin, Boston, 1983.
[YOKO]
Yukio Yokoyama, "Tokushu joho kaisoka," unpublished handwritten manuscript.
[YOUS]
Youshkevitch, A. P., Geschichte der Mathematik im Mittelatter, Liepzig, Germany: Teubner, 1964.
[YUKI]
Yukio Nishihara, "Kantogan tai-So Sakusenshi," Vol 17., unpublished manuscript, National Institute for Defense Studies Military Archives, Tokyo.,(hereafter NIDS Archives)
[ZIM]
Zim, Herbert S., "Codes and Secret Writing." William Morrow Co., New York, 1948.
[ZEND]
Callimahos, L. D., Traffic Analysis and the Zendian Problem, Agean Park Press, 1984. (also available through NSA Center for Cryptologic History)